{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:47:24Z","timestamp":1740160044271,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s13198-020-01008-4","type":"journal-article","created":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T10:02:55Z","timestamp":1592560975000},"page":"176-187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On interdisciplinarity between product adoption and vulnerability discovery modeling"],"prefix":"10.1007","volume":"12","author":[{"given":"Avinash K.","family":"Shrivastava","sequence":"first","affiliation":[]},{"given":"Armaan Singh","family":"Ahluwalia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8006-5952","authenticated-orcid":false,"given":"P. K.","family":"Kapur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,19]]},"reference":[{"issue":"3","key":"1008_CR1","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.cose.2006.10.002","volume":"26","author":"OH Alhazmi","year":"2007","unstructured":"Alhazmi OH, Malaiya YK, Ray I (2007) Measuring, analyzing and predicting security vulnerabilities in software systems. Comput Secur 26(3):219\u2013228","journal-title":"Comput Secur"},{"issue":"4","key":"1008_CR2","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1057\/s41270-016-0005-z","volume":"4","author":"A Anand","year":"2016","unstructured":"Anand A, Agarwal M, Bansal G, Garmabaki AHS (2016) Studying product diffusion based on market coverage. J Mark Anal 4(4):135\u2013146","journal-title":"J Mark Anal"},{"issue":"3","key":"1008_CR3","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1287\/mksc.13.3.203","volume":"13","author":"FM Bass","year":"1994","unstructured":"Bass FM, Krishnan TV, Jain DC (1994) Why the Bass model fits without decision variables. Mark Sci 13(3):203\u2013223","journal-title":"Mark Sci"},{"key":"1008_CR4","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1287\/mnsc.15.5.215","volume":"15","author":"FM Bass","year":"1969","unstructured":"Bass FM (1969) A new-product growth model for consumer durables. Manage Sci 15:215\u2013227","journal-title":"Manage Sci"},{"issue":"2","key":"1008_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1177\/002224296002500206","volume":"25","author":"LA Fourt","year":"1960","unstructured":"Fourt LA, Woodlock JW (1960) Early prediction of market success for new grocery products. J Mark 25(2):31\u201338","journal-title":"J Mark"},{"issue":"3","key":"1008_CR6","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TR.1979.5220566","volume":"28","author":"AL Goel","year":"1979","unstructured":"Goel AL, Okumoto K (1979) Time dependent error detection rate model for software reliability and other performance measures. IEEE Trans Reliab 28(3):206\u2013211","journal-title":"IEEE Trans Reliab"},{"key":"1008_CR7","unstructured":"Hull CL (1951) Essentials of behavior. Yale University Press"},{"issue":"3","key":"1008_CR8","first-page":"413","volume":"11","author":"PC Jha","year":"2008","unstructured":"Jha PC, Gupta A, Kapur PK (2008) Bass model revisited. J Stat Manag Syst 11(3):413\u2013437","journal-title":"J Stat Manag Syst"},{"issue":"06","key":"1008_CR9","doi-asserted-by":"publisher","first-page":"1640013","DOI":"10.1142\/S0218539316400131","volume":"23","author":"Y Kansal","year":"2016","unstructured":"Kansal Y, Kumar D, Kapur PK (2016) Vulnerability patch modeling. Int J Reliab Qual Saf Eng 23(06):1640013","journal-title":"Int J Reliab Qual Saf Eng"},{"key":"1008_CR10","doi-asserted-by":"crossref","unstructured":"Kansal Y, Kapur PK, Kumar U, Kumar D (2017). Effort and coverage dependent vulnerability discovery modeling. In 2017 2nd International Conference on Telecommunication and Networks (TEL-NET) (pp. 1\u20136). IEEE","DOI":"10.1109\/TEL-NET.2017.8343550"},{"key":"1008_CR11","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1049\/sej.1992.0030","volume":"7","author":"PK Kapur","year":"1992","unstructured":"Kapur PK, Garg RB (1992) A software reliability growth model for an error removal phenomenon. Softw Eng J 7:291\u2013294","journal-title":"Softw Eng J"},{"key":"1008_CR12","doi-asserted-by":"publisher","DOI":"10.1142\/4011","volume-title":"Contributions to hardware and software reliability","author":"PK Kapur","year":"1999","unstructured":"Kapur PK, Garg RB, Kumar S (1999) Contributions to hardware and software reliability. World Scientific, Singapore"},{"key":"1008_CR13","series-title":"Mathematics and Information Theory","volume-title":"An alternative formulation of innovation diffusion model and its extension","author":"PK Kapur","year":"2004","unstructured":"Kapur PK, Bardhan AK, Jha PC (2004a) An alternative formulation of innovation diffusion model and its extension. Mathematics and Information Theory. Anamaya Publications, New Delhi, India"},{"issue":"04","key":"1008_CR14","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1142\/S0218539304001567","volume":"11","author":"PK Kapur","year":"2004","unstructured":"Kapur PK, Singh O, Mittal R (2004b) Software reliability growth and innovation diffusion models: an interface. Int J Reliab Qual Saf Eng 11(04):339\u2013364","journal-title":"Int J Reliab Qual Saf Eng"},{"issue":"1","key":"1008_CR15","first-page":"34","volume":"16","author":"PK Kapur","year":"2007","unstructured":"Kapur PK, Singh VB, Anand S, Yadavalli VSS (2007) An innovation diffusion model incorporating change in the adoption rate. Manag Dyn J South Afr Inst Manag Sci 16(1):34\u201341","journal-title":"Manag Dyn J South Afr Inst Manag Sci"},{"key":"1008_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-204-9","volume-title":"Software reliability assessment with OR application","author":"PK Kapur","year":"2011","unstructured":"Kapur PK, Pham H, Gupta A, Jha PC (2011) Software reliability assessment with OR application. Springer, Berlin"},{"issue":"03","key":"1008_CR17","doi-asserted-by":"publisher","first-page":"1340004","DOI":"10.1142\/S0218539313400044","volume":"20","author":"PK Kapur","year":"2013","unstructured":"Kapur PK, Yamada S, Aggarwal AG, Shrivastava AK (2013) Optimal price and release time of a software under warranty. Int J Reliab Qual Saf Eng 20(03):1340004","journal-title":"Int J Reliab Qual Saf Eng"},{"key":"1008_CR18","doi-asserted-by":"crossref","unstructured":"Kapur PK, Khatri SK, Singh O, Shrivastava AK (2014). When to stop testing under warranty using SRGM with change-point. In 2014 Conference on IT in Business, Industry and Government (CSIBIG) (pp. 1\u20137). IEEE","DOI":"10.1109\/CSIBIG.2014.7056961"},{"key":"1008_CR19","doi-asserted-by":"crossref","unstructured":"Kapur PK, Singh O, Shrivastava AK, Singh JN (2015) A software up-gradation model with testing effort and two types of imperfect debugging. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (pp. 613\u2013618). IEEE","DOI":"10.1109\/ABLAZE.2015.7154935"},{"key":"1008_CR20","doi-asserted-by":"crossref","unstructured":"Kapur PK, Yadavali VS, Shrivastava AK (2015a) A comparative study of vulnerability discovery modeling and software reliability growth modeling. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (pp. 246\u2013251). IEEE","DOI":"10.1109\/ABLAZE.2015.7155000"},{"key":"1008_CR21","doi-asserted-by":"crossref","unstructured":"Kapur PK, Panwar S, Shrivastava AK, Khatri SK (2017) Multi-generation diffusion of technology. In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 31\u201337). IEEE","DOI":"10.1109\/ICRITO.2017.8342393"},{"issue":"4","key":"1008_CR22","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1504\/IJMOR.2018.095486","volume":"13","author":"PK Kapur","year":"2018","unstructured":"Kapur PK, Singh O, Shrivastava AK (2018) A unified approach for optimal release, patching and testing time of a software. Int J Math Operational Res 13(4):471\u2013491","journal-title":"Int J Math Operational Res"},{"issue":"4","key":"1008_CR23","doi-asserted-by":"publisher","first-page":"86","DOI":"10.4018\/IJSI.2019100105","volume":"7","author":"S Khurshid","year":"2019","unstructured":"Khurshid S, Shrivastava AK, Iqbal J (2019) Generalized multi-release framework for fault prediction in open source software. Int J Softw Innov (IJSI) 7(4):86\u2013107","journal-title":"Int J Softw Innov (IJSI)"},{"key":"1008_CR24","doi-asserted-by":"crossref","unstructured":"Kumar V, Kapur PK, Shrivastava AK, Sharma R (2014) Optimal strategies for price-warranty decision model of software product with dynamic production cost. In Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization (pp. 1\u20136). IEEE","DOI":"10.1109\/ICRITO.2014.7014671"},{"issue":"2","key":"1008_CR25","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1509\/jmkr.46.2.163","volume":"46","author":"B Libai","year":"2009","unstructured":"Libai B, Muller E, Peres R (2009) The diffusion of services. J Mark Res 46(2):163\u2013175","journal-title":"J Mark Res"},{"issue":"1","key":"1008_CR26","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/002224379002700104","volume":"27","author":"V Mahajan","year":"1990","unstructured":"Mahajan V, Muller E, Srivastava RK (1990) Determination of adopter categories by using innovation diffusion models. J Mark Res 27(1):37\u201350","journal-title":"J Mark Res"},{"key":"1008_CR27","first-page":"251","volume-title":"Modeling fault detection phenomenon in multiple sprints for agile software environment. In quality, IT and business operations","author":"P Mishra","year":"2018","unstructured":"Mishra P, Shrivastava AK, Kapur PK, Khatri SK (2018) Modeling fault detection phenomenon in multiple sprints for agile software environment. In quality, IT and business operations. Springer, Singapore, pp 251\u2013263"},{"issue":"06","key":"1008_CR28","doi-asserted-by":"publisher","first-page":"1740007","DOI":"10.1142\/S0218539317400071","volume":"24","author":"G Mishra","year":"2017","unstructured":"Mishra G, Kapur PK, Shrivastava AK (2017) Multi release cost model\u2014a new perspective. Int J Reliab Qual Saf Eng 24(06):1740007","journal-title":"Int J Reliab Qual Saf Eng"},{"issue":"01","key":"1008_CR29","doi-asserted-by":"publisher","first-page":"1850002","DOI":"10.1142\/S021853931850002X","volume":"25","author":"S Narang","year":"2018","unstructured":"Narang S, Kapur PK, Damodaran D, Shrivastava AK (2018) Bi-criterion problem to determine optimal vulnerability discovery and patching time. Int J Reliab Qual Saf Eng 25(01):1850002","journal-title":"Int J Reliab Qual Saf Eng"},{"key":"1008_CR30","doi-asserted-by":"crossref","unstructured":"Narang S, Kapur PK, Damodaran D, and Shrivastava AK (2017) User-based multi-upgradation vulnerability discovery model. In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 400\u2013405). IEEE","DOI":"10.1109\/ICRITO.2017.8342459"},{"key":"1008_CR31","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.ijinfomgt.2019.07.017","volume":"49","author":"D Nam","year":"2019","unstructured":"Nam D, Lee J, Lee H (2019) Business analytics adoption process: an innovation diffusion perspective. Int J Inf Manage 49:411\u2013423","journal-title":"Int J Inf Manage"},{"issue":"1","key":"1008_CR32","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2005.17","volume":"3","author":"E Rescorla","year":"2005","unstructured":"Rescorla E (2005) Is finding security holes a good idea? IEEE Secur Priv 3(1):14\u201319","journal-title":"IEEE Secur Priv"},{"key":"1008_CR33","volume-title":"Diffusion of innovations","author":"EM Rogers","year":"1962","unstructured":"Rogers EM (1962) Diffusion of innovations. The Free Press, New York"},{"issue":"4","key":"1008_CR34","first-page":"464","volume":"34","author":"I Saraf","year":"2020","unstructured":"Saraf I, Shrivastava AK, Iqbal J (2020) Generalised fault detection and correction modelling framework for multi-release of software. Int J Ind Syst Eng 34(4):464\u2013493","journal-title":"Int J Ind Syst Eng"},{"key":"1008_CR35","doi-asserted-by":"crossref","unstructured":"Sharma R, Sibal R, Sabharwal S (2018) Change point modelling in the vulnerability discovery process. In International Conference on Advanced Informatics for Computing Research (pp. 559\u2013568). Springer, Singapore","DOI":"10.1007\/978-981-13-3143-5_46"},{"issue":"4","key":"1008_CR36","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/IJSSE.2016100102","volume":"7","author":"R Sharma","year":"2016","unstructured":"Sharma R, Sibal R, Shrivastava AK (2016) Vulnerability discovery modeling for open and closed source software. Int J Secure Softw Eng (IJSSE) 7(4):19\u201338","journal-title":"Int J Secure Softw Eng (IJSSE)"},{"issue":"3","key":"1008_CR37","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.technovation.2013.11.008","volume":"34","author":"X Shi","year":"2014","unstructured":"Shi X, Fernandes K, Chumnumpan P (2014) Diffusion of multi-generational high-technology products. Technovation 34(3):162\u2013176","journal-title":"Technovation"},{"key":"1008_CR38","doi-asserted-by":"crossref","unstructured":"Shrivastava AK, Sharma R, and Kapur PK (2015) Vulnerability discovery model for a software system using stochastic differential equation. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (pp. 199\u2013205). IEEE","DOI":"10.1109\/ABLAZE.2015.7154992"},{"issue":"1","key":"1008_CR39","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1504\/IJTM.2016.074672","volume":"70","author":"P Shrivastava","year":"2016","unstructured":"Shrivastava P, Ivanaj S, Ivanaj V (2016) Strategic technological innovation for sustainable development. Int J Technol Manage 70(1):76\u2013107","journal-title":"Int J Technol Manage"},{"key":"1008_CR40","first-page":"189","volume":"1","author":"AK Shrivastava","year":"2018","unstructured":"Shrivastava AK, Das S, Anand A, Singh O (2018) Optimizing price, release, and testing stop time decisions of a software product. Syst Reliab Manag Solut Technol 1:189\u2013202","journal-title":"Syst Reliab Manag Solut Technol"},{"key":"1008_CR41","doi-asserted-by":"publisher","first-page":"34","DOI":"10.2174\/9781681087139118020007","volume":"2","author":"AK Shrivastava","year":"2018","unstructured":"Shrivastava AK, Kapur PK (2018) Development of software reliability growth models with time lag and change-point and a new perspective for release time problem. Math Appl Inf Syst 2:34\u201352","journal-title":"Math Appl Inf Syst"},{"key":"1008_CR42","doi-asserted-by":"crossref","unstructured":"Shrivastava AK, Sharma R (2018) Modeling vulnerability discovery and patching with fixing lag. In International Conference on Advanced Informatics for Computing Research (pp. 569\u2013578). Springer, Singapore","DOI":"10.1007\/978-981-13-3143-5_47"},{"key":"1008_CR43","doi-asserted-by":"publisher","DOI":"10.1108\/IJQRM-07-2019-0227","author":"AK Shrivastava","year":"2019","unstructured":"Shrivastava AK, Sachdeva N (2019) Generalized software release and testing stop time policy. Int J Qual Reliab Manag. https:\/\/doi.org\/10.1108\/IJQRM-07-2019-0227","journal-title":"Int J Qual Reliab Manag"},{"key":"1008_CR44","doi-asserted-by":"crossref","unstructured":"Singh O, Kapur PK, Shrivastava AK, Das L (2014) A unified approach for successive release of a software under two types of imperfect debugging. In Proceedings of 3rd international conference on reliability, infocom technologies and optimization (pp. 1\u20136). IEEE","DOI":"10.1109\/ICRITO.2014.7014695"},{"issue":"1","key":"1008_CR45","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.ejor.2015.03.008","volume":"245","author":"C Stummer","year":"2015","unstructured":"Stummer C, Kiesling E, G\u00fcnther M, Vetschera R (2015) Innovation diffusion of repeat purchase products in a competitive market: an agent-based simulation approach. Eur J Oper Res 245(1):157\u2013167","journal-title":"Eur J Oper Res"},{"key":"1008_CR46","doi-asserted-by":"publisher","first-page":"44276","DOI":"10.1109\/ACCESS.2019.2907977","volume":"7","author":"X Wang","year":"2019","unstructured":"Wang X, Ma R, Li B, Tian D, Wang X (2019) E-WBM: an effort-based vulnerability discovery model. IEEE Access 7:44276\u201344292","journal-title":"IEEE Access"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-020-01008-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-020-01008-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-020-01008-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T23:49:20Z","timestamp":1624060160000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-020-01008-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,19]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["1008"],"URL":"https:\/\/doi.org\/10.1007\/s13198-020-01008-4","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2020,6,19]]},"assertion":[{"value":"7 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}